0
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-07-13 21:50:33 +03:00

nixos/tika: init module

This commit is contained in:
Pol Dellaiera 2024-07-12 12:59:00 +02:00
parent a37affa585
commit c8bf7321a9
No known key found for this signature in database
GPG key ID: D476DFE9C67467CA
6 changed files with 114 additions and 0 deletions

View file

@ -1264,6 +1264,7 @@
./services/search/qdrant.nix
./services/search/quickwit.nix
./services/search/sonic-server.nix
./services/search/tika.nix
./services/search/typesense.nix
./services/security/aesmd.nix
./services/security/authelia.nix

View file

@ -0,0 +1,84 @@
{
config,
lib,
pkgs,
...
}:
let
cfg = config.services.tika;
inherit (lib)
literalExpression
mkIf
mkEnableOption
mkOption
mkPackageOption
getExe
types
;
in
{
meta.maintainers = [ lib.maintainers.drupol ];
options = {
services.tika = {
enable = mkEnableOption "Apache Tika server";
package = mkPackageOption pkgs "tika" { };
listenAddress = mkOption {
type = types.str;
default = "127.0.0.1";
example = "0.0.0.0";
description = ''
The Apache Tika bind address.
'';
};
port = mkOption {
type = types.port;
default = 9998;
description = ''
The Apache Tike port to listen on
'';
};
configFile = mkOption {
type = types.nullOr types.path;
default = null;
description = ''
The Apache Tika configuration (XML) file to use.
'';
example = literalExpression "./tika/tika-config.xml";
};
openFirewall = mkOption {
type = types.bool;
default = false;
description = ''
Whether to open the firewall for Apache Tika.
This adds `services.tika.port` to `networking.firewall.allowedTCPPorts`.
'';
};
};
};
config = mkIf cfg.enable {
systemd.services.tika = {
description = "Apache Tika Server";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
Type = "simple";
ExecStart = "${getExe cfg.package} --host ${cfg.listenAddress} --port ${toString cfg.port} ${lib.optionalString (cfg.configFile != null) "--config ${cfg.configFile}"}";
DynamicUser = true;
StateDirectory = "tika";
CacheDirectory = "tika";
};
};
networking.firewall = mkIf cfg.openFirewall { allowedTCPPorts = [ cfg.port ]; };
};
}